Guide to Computer Law—Number 287 Practitioner’s Perspective by Holly K. Towle, J.D. Holly K. Towle is a partner with Kirpatrick & Lockhart Preston Gates Ellis LLP (K&L Gates), an international law firm, and chair of the firm’s E-merging Commerce group. Holly is located in the firm’s Seattle office and is the coauthor of The Law of Electronic Commercial Transactions (2003, A.S. Pratt & Sons). Holly.Towle@KLgates.com, 206-623-7580. Merger & Acquisition Due Diligence in an E-Information Age The importance of due diligence (“DD”) reviews is no secret. Companies learned hard lessons long ago about acquiring or merging with other companies before finding out relevant details about the target company, such as what leases are non-assignable and what loan defaults can be triggered by a change in control. The only way to discover those details and discern their impact on the target’s value is to review selected contracts and documents of the target (such as the lease and loan contracts), and that is just what the DD team does. With the advent of the information age, intellectual property rights and software licenses emerged as significant assets of many businesses. More people were added to the DD team in order to ensure that those more exotic rights would not be lost or changed in the transfer. Even today, DD teams struggle to make intellectual property due diligence sufficiently robust (e.g., adding reviews for open source software and its potential “viral” effect). DD teams also struggle to cover emerging issues. One of those is what I will call “Non-Intellectual Property/Electronic” due diligence (“E-DD”), and it is the focus of this article. Although intellectual property issues remain important, in E-DD the focus is on information that tends not to enjoy intellectual property protection (such as data) and on issues arising from doing business electronically such that computer information is created, collected, held, used, or discarded. Numerous new laws create a need for E-DD because they can influence the target company’s value as much or more than the subjects of traditional DD and intellectual property DD. Simply increasing the scope of a DD review is not the solution. The new laws governing business done electronically (in whole or part) and the information age itself, require: (i) taking another look at some of the fundamental premises of typical merger and acquisition agreements and revising them in small but important ways; and (ii) altering DD procedures to incorporate review of additional issues. Here are a few examples. Practitioner’s Perspective appears periodically in the monthly Report Letter of the CCH Guide to Computer Law. Various practitioners provideindepth analyses of significant issues and trends. 1. Is the wording of the acquisition agreement now unclear? In most acquisition agreements the target represents that it is qualified to do business in all jurisdictions in which it currently does business and/ or in listed jurisdictions. That used to be a fair question that could be answered with reasonable certainty, i.e., the business could decide where it had people, assets, offices, and stores etc. and get pretty close to an accurate answer notwithstanding variations in state or country laws regarding what constitutes “doing business.” CCH GUIDE TO COMPUTER LAW With the pervasive use of the Internet where the “corner drug store” can do business globally in over 160 countries and 50 U.S. states with varying laws, such accuracy is more difficult to achieve. A first question is whether the traditional representation even encompasses Internet operations, e.g., would a judge readily interpret acquisition agreement language used pre-Internet to cover Internet operations? A second question is whether, when, and to what extent it is appropriate to require a representation encompassing the Internet? For example, can a target doing business on the Internet reasonably make a representation given the uncertainty of the legal analysis and varying answers that can be supplied to the question of where it is “doing business”?1 An acquiring party’s demand for a blanket representation may overreach in this context; but targets that have not previously considered the issue will have more troubles ahead than determining how to make an accurate representation. Of course, addressing the question may or may not be important, e.g., the target’s Internet operations might not be material, or it might be difficult to obtain or enforce judgments against the target in other countries, or the target might not have any assets in other countries to seize. Any analysis will change with changes in laws and treaties and E-DD should be scaled appropriately for the circumstances and levels of risk. In any event, however, clarification of the acquisition agreement may be advisable. 2. Is the acquisition agreement wording outdated? Most agreements focus on tangible “property” concepts, yet many items that are important in an information economy are not tangible and some are not even “property.”2 This is not a new concept. As intellectual property rights became as or more important than brick and mortar assets, agreements made the shift from focusing on tangible property—“sales,” “leases,” “ownership,” and “title”—to dealing with “licenses” and intangible property rights. But vestiges of toorestrictive language remain in most agreements even as to intellectual property rights, and few fully contemplate E-DD issues.3 For example, when a consumer “opts into” receiving direct marketing e-mails, the resulting customer list may be important in the deal but it is not necessarily a “contract” or “property” and is not an intellectual property “right.” It may simply be a non-contractual permission or consent or waiver of a new right, and the question is whether the acquisition agreement is worded to address such rights and other E-DD concepts? Another illustration concerns use of the word “infringe.” If the agreement has the target warrant that it does not “infringe,” that may work fine with respect to intellectual property rights, i.e., one “infringes” a copyright, a patent and a trademark. But if the target has been sending electronic robots to gather data from third party websites in violation of the terms of use for those sites, that can be a “trespass” under current NUMBER 287 law but is it an “infringement”?4 Similarly, if a clause requires submission of “material contracts,” will that clause require submission of a non-contractual privacy policy that is material to the transaction? The point is that use of terminology relevant to the target, or relevant in an electronic information age generally, is preferable. 3. What E-DD laws are we talking about? There are too many laws and potential applications to address here, so here are two illustrations: • Assume an acquirer is valuing the target in part for its customer list at X amount per customer; acquirer intends to use the list to send marketing materials touting the enhanced services available from the merged entity. The target has warranted that the number of customers is accurate, which it is. But having customers is not the same, any more, as being permitted to send marketing e-mails to them. In an increasing number of settings, customers may “opt-out” of receiving materials by e-mail and companies possessing lists are obligated (by law or their privacy policies) to track those customers who do so for a number of years to ensure that they do not receive further emails.5 If the DD process ignores this issue, the acquiring party may pay for something it is not really getting (and, perhaps, allocate to much value for tax, accounting, and other purposes to the list6). Even if an acquirer obtains a representation and warranty that would have been satisfactory in the past, new laws and rules may undermine its value. In fact, one division of the target might not be telling another division about opt-outs; no one at the target may be minding the store with a central list; and systems to track the list for the required number of years may be nonexistent or inadequate. It is not simple or inexpensive to design an adequate tracking system, so it should not be surprising if a target does not have one. • Assume that the target company stores credit card numbers for the convenience of customers, i.e., so that they do not have to repeat the card information to telephone operators or re-enter information on–line. While this used to be common, modern credit card processing contracts likely prohibit at least retention of the card number. If the target is keeping the numbers, in addition to breach of contract it may also run afoul of new rules and heavy fines by credit card processors upon any breach of information security. These can include annual audit obligations and increased transaction fees, all of which will increase operational costs and, perhaps, create second thoughts about the acquisition price. In addition to the contractual point, there is new law, or at least new claims, affecting the ability of companies to keep credit card numbers. The FTC recently alleged that failure of a business to abide by its credit card processing contract, and CCH GUIDE TO COMPUTER LAW the business’ retention of credit card data too long, were part of other factors amounting to inadequate security practices and an unfair act.7 Although the FTC’s basis for bringing that action can be questioned, there are other laws that can apply in particular circumstances. For example, numerous new state laws require notice to affected customers when there has been a breach of information security.8 The infamous “ChoicePoint” incident made headlines in February 2005 when ChoicePoint provided notice that it had been duped into selling personal information of almost 145,000 people. It made this disclosure under a 2003 California law (which recently has been followed by non-uniform legislation in at least 17 more states) more than eight months after the breach occurred. While delay can also be a violation, had ChoicePoint been an acquisition target during this period, asking whether it had suffered any security breaches as part of E-DD might have elicited important information. Once the announcement of the incident was made, the ChoicePoint stock lost 1.3% the next day, fell nearly 14% the next week and as of June 2005, was still down more than 12% from the day of disclosure.9 4. Won’t a representation regarding compliance with all applicable law solve all of this? In an E-DD context, such a representation isn’t very helpful for at least two reasons. First, it may provide legal recourse against a noncompliant target, but that is not the primary goal of DD. The usual goal is to find out what material problems might exist before the transaction is completed and, therefore, be able to fix them or assess their impact on the value of the target. To achieve that goal, DD questions should be more specific. Many targets (and many acquirers) do not even know the new laws exist or do not realize the extent to which they impact the target’s operations and/or the operations of the post-target company. In that setting, unless specific representations are explored in the DD exercise, the necessary information might not be elicited. Second, many of the new laws do not require anything so cannot be violated— they simply create material consequences if the law is ignored. Thus, a target could accurately represent that it is not in violation of law while still being at risk under it. For example, assume the target has a website where customers make contracts (e.g., agree to terms of use or order goods under stated terms that are agreed as part of the ordering process). Those are electronic records and several state and federal laws will affect the records simply because they are electronic (i.e., these laws do not exist for paper records).10 For example, under federal law e-records may be denied legal effect, validity or enforceability if they do not meet federal rules regarding electronic records. There is no “violation” of law if NUMBER 287 the rule is not met—the record may simply be susceptible to challenge.11 The point is that the target might not have the enforceable or valid contract or other record that it thinks it has—instead, it may have contracts and records that are subject to challenge because that is a consequence of, but not a requirement of, not meeting the new e-rules. Had the acquirer sought a specific representation regarding electronic records and done some E-DD regarding them, it might have paid less for the contracts or added “fix e-records and procedures” to its postmerger to-do list. 5. What’s best: due diligence or a mere representation? “Mere” is a tip-off to my views on the answer to that question, i.e., some of the E-DD liabilities and issues tend to create an affirmative need to investigate instead of relying on representations (depending on the circumstances, of course). Engaging in E-DD is increasingly critical as the legal (and business) risks associated with data and doing business electronically increase. For example, in modern practice a mismatch between privacy policy text and privacy practice,12 or a failure adequately to protect personally identifying information,13 may present greater liability or reputational risk and business disruption than many issues examined in traditional due diligence. 6. What about the lawyers—if they revise the agreement and expand due diligence appropriately, is that all there is to it? No. Anyone who has been through a merger or acquisition transaction knows that the acquiring party’s lawyers need to understand and explain why they have requested a representation or required production of certain material, or their client may be viewed as overreaching and possibly undermine any necessary post-transaction relations. Lawyers for the target have to understand the flip side, i.e., they need to be able to point out why the request is unreasonable, overbroad or irrelevant in the circumstances. To engage in this dialogue, one needs to understand the laws behind an E-DD representation or request and be able to adjust the request according to the actual needs and circumstances. It is unreasonable to expect the merger and acquisition lawyers to find, read, understand, and keep up with all of the new and ever-proliferating laws impacting business done electronically, so the better approach is to engage in educational and training efforts with them and even the client (e.g., how much patience will a client have for a request made by its own side when the client doesn’t understand the reason for the request?). If the foregoing reasons for engaging in educational efforts is not enough, consider the fact that the lawyers and clients may, themselves, violate some of the laws relevant to E-DD because of their lack of education. CCH GUIDE TO COMPUTER LAW NUMBER 287 See a report by the Canadian Privacy Commissioner at http://www.oipc.ab.ca/home/DetailsPage.cfm?ID=2076 for an example. The law firms in an acquisition posted too much information in the Canadian equivalent of the U.S. “EDGAR” public filing system which requires posting of all material contracts of the relevant company. A schedule containing personal information (employee names and social security numbers) was posted even though the data was not required for the transaction. The result was a violation of the Canadian Privacy Act and imposition on the law firms and clients of training and procedural requirements, including the appointment of privacy officers. 3 As should be obvious by now, both concepts, details and the nature of the target, as well as an understanding of the relevant laws relevant to E-DD concepts, are necessary in order to conduct E-DD effectively. One place to start, however, is by updating acquisition agreements and considering changes in the focus of due diligence procedures. 7 Footnotes 10 1 2 See Holly Towle and Raymond Nimmer, The Law of Electronic Commercial Transactions (hereafter “E-Commercial Law”) at Chapter 7.09 (A.S. Pratt & Sons 2003-2005)(explanation of the various tests used by courts to determine general and specific personal jurisdiction issues regarding websites). Although a “personal jurisdiction” analysis differs from a “doing business” analysis, uncertainty with one tends to indicate uncertainty for the other. See e.g., E-Commercial Law at Chapter 7.07(case law regarding domain names as seizable—or not—property). 4 5 6 8 9 11 12 13 For a discussion of the conceptual differences attendant upon information, see e.g., E-Commercial Law at Chapter 8.01 (nature of an access contract and applicable law). See e.g., E-Commercial Law at Chapter 3 (Property Rights – Thinking Beyond Intellectual Property). See e.g., E-Commercial Law at Chapter 13.07[4](spam, including federal CANSPAM Act) and see Chapter 12 generally (Privacy) and Chapter 12.19 (Sharing of Information for Unsolicited Marketing). For more information regarding this issue, see Scott David, “New Challenges in Valuing Customer Lists and Customer Based Assets in the New Economy: Tax and Related Issues.” (publication pending). Scott can be reached at ScottD@prestongates.com. See FTC compliant at No. 9, In the Matter of BJ’s Wholesale Club, FTC File No. 0423160 (copy available at http://www. ftc.gov/opa/2005/06/bjswholesale.htm) See E-Commercial Law at Chapter 12.17 (see also upcoming update). Michael Rapoport, “Companies Pay a Price for Security Breaches,” Wall Street Journal (6/5/05). See E-Commercial Law at Chapter 4 (“Laws Validating Electronic Transactions”). That is not to say that there cannot be violations of law, e.g., in consumer contracts the e-contracting procedure might violate a consumer protection law because of a lack of compliance with a special e-rule. See E-Commercial Law at Chapter 11.09 (“E-Sign Consumer Consent Rule”). See E-Commercial Law at Chapter 12 (“Online Informational Privacy and Data Protection”). See E-Commercial Law at Chapter 12.17 (“Security of Information Systems”).